CN113553601A - Webpage content encryption method and equipment - Google Patents

Webpage content encryption method and equipment Download PDF

Info

Publication number
CN113553601A
CN113553601A CN202010328794.XA CN202010328794A CN113553601A CN 113553601 A CN113553601 A CN 113553601A CN 202010328794 A CN202010328794 A CN 202010328794A CN 113553601 A CN113553601 A CN 113553601A
Authority
CN
China
Prior art keywords
content
encryption
webpage
font
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010328794.XA
Other languages
Chinese (zh)
Other versions
CN113553601B (en
Inventor
高力
胡金涌
丁兆鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yundun Information Technology Co ltd
Original Assignee
Shanghai Yundun Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yundun Information Technology Co ltd filed Critical Shanghai Yundun Information Technology Co ltd
Priority to CN202010328794.XA priority Critical patent/CN113553601B/en
Publication of CN113553601A publication Critical patent/CN113553601A/en
Application granted granted Critical
Publication of CN113553601B publication Critical patent/CN113553601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Abstract

The application aims to provide a webpage content encryption method and equipment, and webpage content corresponding to an access request of a user is obtained; based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; according to the font encryption type, the page content on the element positioning position in the webpage content is replaced by the content in the target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, the effect of preventing the crawler is achieved, meanwhile, the risk of mistaken killing does not exist for the visitor who normally visits through the browser, the visitor can see all content information presented on the webpage, and the user experience is improved.

Description

Webpage content encryption method and equipment
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for encrypting content of a web page.
Background
In the prior art, with the development of the internet, the number of netizens who use the internet to make shopping, trading, socializing, learning news information and the like is increasing. The internet is also becoming an important way for economic development and social civilization construction. Meanwhile, under the drive of various benefits, mass data exposed on the Internet are subjected to website data crawling collection, sorting, analysis and calculation through unauthorized and targeted collection programs, and finally, the method is used for gaining violence through illegal competition, illegal stealing and the like. According to relevant statistics, approximately 80% of the traffic per day is initiated by the crawler software on the internet. Therefore, the website service and intellectual property can be effectively protected by identifying and protecting the crawler. However, the existing technologies for protecting the crawler are mostly temporary solution and permanent solution strategies, and still have a plurality of defects.
The existing scheme I is as follows: by accessing frequency limits, crawling behavior is limited. There are the following disadvantages: 1. normal visitors are easy to kill by mistake, and a proper frequency threshold value is difficult to measure for distinguishing the access frequency of the normal visitors from the access frequency of the crawler; 2. the anti-crawler effect is not good, and crawler software can modulate the frequency and bypass the set access frequency limit. The existing scheme is as follows: and identifying crawler access through browser behavior verification, such as cookie verification, javascript verification, verification codes and other browser behavior verification strategies. There are the following disadvantages: 1. the verification strategy is easy to be bypassed by crawler software, and a plurality of crawler scripts or programs can have cookie verification, js verification functions and the like; in addition, a plurality of third-party services for cracking the verification codes are provided, so that the verification codes can be cracked conveniently. 2. When a user visits a website, the user can use the verification code additionally, so that poor physical examination is easily caused. The existing scheme is three: and comparing the IP of the accessed website with the constructed IP library (i.e. a crawler information library), and identifying the crawler IP (Internet Protocol) so as to realize protection. There are the following disadvantages: 1. the method completely depends on an IP library, and the information has certain delay, so that the crawler attack cannot be identified and protected in time. 2. Crawler IPs easily bypass the IP library, especially when the IP library is not healthy, and can be bypassed using various proxy IPs.
Therefore, an anti-crawling scheme capable of protecting key information data on the internet and not affecting normal visitors is urgently needed.
Disclosure of Invention
An object of the present application is to provide a method and device for encrypting content of a web page, so as to solve the problem in the prior art how to protect key data information on the web page in the internet, and at the same time, not affect the access of a normal visitor to the web page.
According to one aspect of the application, a method for encrypting webpage content is provided, which comprises the following steps:
acquiring webpage content corresponding to an access request of a user;
based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content;
randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content;
and replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type.
Further, the method for encrypting the webpage content further comprises the following steps:
acquiring a website service requirement of the user from user equipment;
and configuring the preset page encryption configuration information and a first enabling condition for the webpage to be acquired by the user according to the website service requirement.
Further, in the method for encrypting the content of the web page, obtaining the element locating position of the web page corresponding to the content of the web page further includes:
and positioning the page encryption element on the webpage content to obtain an element positioning position.
Further, in the method for encrypting webpage content, before the acquiring webpage content corresponding to the access request of the user, the method further includes:
starting a content encryption function of the webpage which the user requests to access;
judging whether the webpage which the user requests to access is configured with a first enabling condition for starting the content encryption function or not,
if not, the system defaults that the webpage page which the user requests to access meets a second enabling condition for starting the content encryption function;
and if so, carrying out condition matching on the webpage which the user requests to access and the configured first enabling condition.
Further, in the method for encrypting content of a web page, the preset page encryption configuration information includes first page encryption element range configuration information and/or first font encryption type configuration information, where the positioning of the page encryption element on the content of the web page based on the preset page encryption configuration information to obtain an element positioning position and determining the font encryption type in the content of the web page includes:
judging whether the preset page encryption configuration information is configured with a page encryption element range or not,
if not, positioning the page encryption element of the webpage content according to the default second page encryption element range configuration information of the system to obtain an element positioning position,
if so, positioning the page encryption element of the webpage content according to the first page encryption element range configuration information to obtain an element positioning position;
and determining the font encryption type in the webpage content based on the first font encryption type configuration information.
Further, in the method for encrypting content of a web page, the determining a font encryption type in the content of the web page based on the first font encryption type configuration information includes:
judging whether the preset page encryption configuration information is configured with a font encryption type or not,
if not, determining the font encryption type configured in the second font encryption type configuration information of the default system as the font encryption type in the webpage content;
and if so, determining the font encryption type configured in the first font encryption type configuration information as the font encryption type in the webpage content.
Further, the method for encrypting the webpage content further comprises the following steps:
and sending the new page content after the webpage content is replaced to user equipment corresponding to the user.
Further, the method for encrypting the webpage content further comprises the following steps:
and updating each font library in the preset font libraries in real time or periodically.
According to another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the method of any one of the above.
According to another aspect of the present application, there is also provided a web page content encryption apparatus, including:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method as in any one of the above.
Compared with the prior art, the method and the device have the advantages that the webpage content corresponding to the access request of the user is obtained; based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; according to the font encryption type, the page content on the element positioning position in the webpage content is replaced by the content in the target font library, namely, the key data information (namely, the page content) on the element positioning position of the webpage is replaced by the target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, a crawler program is difficult to acquire the data of the webpage to be crawled, the effect of preventing the crawler is achieved, meanwhile, the risk of mistaken killing does not exist for the visitor who normally visits through a browser, the visitor can see all content information presented on the webpage, and the user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for encrypting content of a web page in accordance with an aspect of the subject application;
FIG. 2 illustrates a block diagram of an interaction of modules of a method for encrypting content of a web page according to an aspect of the subject application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change RAM (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically erasable programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 is a schematic flowchart illustrating a method for encrypting contents of a webpage according to an aspect of the present application, where the method is applicable to various scenarios of accessing websites based on the internet, and is applied to a website access cloud platform or a CDN (Content Delivery Network) system accessed by the websites, and the method includes step S11, step S12, step S13, and step S14, where the method specifically includes:
step S11, acquiring webpage content corresponding to the access request of the user; here, the specific step of acquiring the webpage content corresponding to the access request of the user may include the following steps: as shown in fig. 2, first, an access request of an access device is received; and then, forwarding the access request to a real website server based on the access request, wherein the real website server obtains website page content corresponding to the access request and sends the corresponding website page content corresponding to the access request to a cloud platform or a CDN system node so as to complete the acquisition of the website page content corresponding to the access request of the user.
Step S12, based on preset page encryption configuration information, obtaining an element positioning position of a web page corresponding to the web page content, and determining a font encryption type in the web page content, thereby implementing positioning of the element of the web page content and determination of the font encryption type.
Step S13, randomly selecting a target font library from preset font libraries, and adding the target font library to the content of the web page, as shown in fig. 2, generating a preset font library for replacing the content of the web page by the custom font library generating module in the edge server, so that when the content of the web page needs to be encrypted and replaced, a target font library can be randomly selected from the preset font libraries for encrypting and replacing the content of the web page that needs to be encrypted.
Step S14, replacing the page content at the element positioning position in the web page content with the content in the target font library according to the font encryption type. The target font library can normally render data information (namely page content on the element positioning position in the page content of the webpage) to be displayed on the browser in an image mode, and a crawler program acquires a string of random messy code data which cannot acquire correct data information, so that the aim of preventing crawlers from crawling data information is fulfilled, meanwhile, the access of normal visitors to websites is not influenced, and the crawlers are fundamentally prevented.
Through the steps S11 to S14, the web page content corresponding to the access request of the user is first obtained; then based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; then randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; and finally, replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type. The key data information (namely page content) on the element positioning position of the webpage is replaced by using a target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, and the crawler program is difficult to acquire the data of the webpage to be crawled, so that the crawler-preventing effect is achieved.
For example: firstly, acquiring webpage content corresponding to an access request of a user; then, based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; then, randomly selecting a target font library from the preset font libraries, and adding the selected target font library information to the webpage content, such as: style label information, font library file link information, etc.; and finally, replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type, so as to realize replacement encryption processing on the webpage content to be encrypted in the webpage content accessed by the user.
An embodiment of the present application provides a method for encrypting web page content, further including:
acquiring a website service requirement of the user from user equipment;
and configuring the preset page encryption configuration information and a first enabling condition for the webpage to be acquired by the user according to the website service requirement. As shown in fig. 2, the preset page encryption configuration information and the first enabling condition are configured for the web page to be acquired by the user at the configuration console according to the website service requirement of the user, that is, the website configuration data is configured for the web page to be acquired by the user.
Here, the first enabling condition is configured according to User requirements, and includes but is not limited to a condition that specifies a font-based anti-crawler enabled URL (Uniform Resource Locator) or URL list (supporting exact match or fuzzy match), a Resource type, an IP or IP list, an IP type, a regional geographic location, a time range control, requested referrer information, requested User-Agent (User Agent), and the like; meanwhile, in an actual use scene, each condition in the first enabling condition can be used independently or in any combination, so that flexible and accurate configuration is realized.
For example, the user may perform targeted advanced configuration according to the actual service requirement of the website, including determining the requirements of resource type, IP or IP list, IP type, regional geographical location, time range control, requested referrer information, and the like. User equipment acquires the website service requirement of the user; the preset page encryption configuration information and the first enabling condition are configured for the webpage to be acquired by the user according to the website service requirement, so that the preset page encryption configuration information and the first enabling condition can be configured more flexibly and accurately, key information in webpage content can be protected more accurately through the configured preset page encryption configuration information and the first enabling condition, and a crawler-proof effect is achieved.
Next to the above embodiment of the present application, the obtaining, in step S12, the element positioning position of the web page corresponding to the web page content further includes: and positioning the page encryption element of the webpage content to obtain an element positioning position, so that the positioning of the page encryption element of the webpage content is realized, and the font encryption type in the webpage content is further determined.
Following the above embodiment of the present application, before the step S11, the method further includes:
starting a content encryption function of the webpage which the user requests to access; the method can be directly developed based on a cloud platform or a CDN system to achieve the effect of rapid deployment, a website with the webpage content encryption function needs to be used, any secondary development is not needed, the webpage content encryption function can be seamlessly started only after the function is started in the corresponding cloud platform or the CDN system, and the method is more flexible.
Judging whether the webpage which the user requests to access is configured with a first enabling condition for starting the content encryption function or not,
if not, the system defaults that the webpage page which the user requests to access meets a second enabling condition for starting the content encryption function; here, the second enabling condition may be a condition including, but not limited to, a default of the system, some passing condition or any condition that a web page can be accessed, and the like.
And if the webpage is configured, performing condition matching on the webpage requested to be accessed by the user and the configured first enabling condition, so that the webpage requested to be accessed by the user is more accurately protected, and resource waste caused by processing webpage content which does not need to be protected is avoided.
For example, first, a content encryption function of a web page to which the user requests access is turned on. When the first enabling condition for starting the content encryption function is not configured on the webpage requested to be accessed by the user, the system defaults that the webpage requested to be accessed by the user meets the second enabling condition for starting the content encryption function to output yes, and executes step S11 to obtain the webpage content corresponding to the access request of the user. When the webpage page which the user requests to access is configured with the first enabling condition for starting the content encryption function, the webpage page which the user requests to access is matched with the configured first enabling condition. If the webpage requested to be accessed by the user meets the first enabling condition, yes is output, and step S11 is executed to obtain the webpage content corresponding to the access request of the user. If the webpage requested to be accessed by the user does not meet the first enabling condition, directly quitting the content encryption function of the webpage, realizing more accurate protection of the webpage requested to be accessed by the user, and simultaneously avoiding resource waste caused by processing the webpage content which does not need to be encrypted and protected.
Next to the above embodiments of the present application, the preset page encryption configuration information includes first page encryption element range configuration information and/or first font encryption type configuration information, where the first page encryption element range configuration information is set by a user according to an actual website business requirement of the user, and may include, but is not limited to, a web page element range that needs to be encrypted, where the web page element range includes, but is not limited to, a whole page element range, a specific web page element range, a specific tag, and a specific element, that is, an element that can be accurately located at a specific position on a page. For example, only the title of the web page is encrypted; encrypting the content in the < label > tag; content having a tag attribute class value of btn is encrypted, and the like. The first font encryption type configuration information is set by a user according to the actual website service requirements of the user, and can include but not limited to numbers, letters and common Chinese characters, and any combination of the numbers, the letters and the Chinese characters, so that the page elements and the font encryption types of the webpage needing to be encrypted are flexibly and accurately configured.
Wherein, the step S12 includes:
judging whether the preset page encryption configuration information is configured with a page encryption element range or not,
if not, positioning the page encryption elements of the webpage content according to the default second page encryption element range configuration information of the system to obtain element positioning positions; here, the second page encryption element range configuration information is default to the system, such as: if not, positioning is carried out according to the built-in second page encryption element range configuration information (the second page encryption element range configuration information includes but is not limited to the content in a default element range such as a < div > tag, and the built-in page encryption element range configuration information can be adjusted and is not limited to the conditions in the example).
If so, positioning the page encryption element of the webpage content according to the first page encryption element range configuration information to obtain an element positioning position;
and determining the font encryption type in the webpage content based on the first font encryption type configuration information.
For example, before encrypting the webpage corresponding to the access request, it is necessary to determine whether a page encryption element range is configured in the preset page encryption configuration information, and when a page encryption element range is configured in the preset page encryption configuration information, according to the first page encryption element range configuration information, the page encryption element is positioned on the webpage content to obtain an element positioning position; and if the positioning fails, quitting the content encryption function of the webpage which the user requests to access. And if the positioning is successful, determining the font encryption type in the webpage content based on the first font encryption type configuration information. When the preset page encryption configuration information is not configured with a page encryption element range, positioning page encryption elements of the webpage content according to second page encryption element range configuration information which is default by a system to obtain an element positioning position, then determining font encryption types in the webpage content based on the first font encryption type configuration information, so that the element positioning position and the font encryption types are determined, so that the step S13 is continuously executed to randomly select a target font library from a preset font library, and the target font library is added to the webpage content, thereby being beneficial to protecting key information of the webpage content and achieving an accurate and real anti-crawling effect.
Following the foregoing embodiment of the present application, the determining, in step S12, a font encryption type in the web page content based on the first font encryption type configuration information includes:
judging whether the preset page encryption configuration information is configured with a font encryption type or not,
if not, determining the font encryption type configured in the second font encryption type configuration information of the default system as the font encryption type in the webpage content; here, the second font encryption type configuration information is default to the system, for example, if the specified protection font type is not configured, a built-in default protection font type, that is, the second font encryption type configuration information is used (where the default font protection type is, for example, a number or a number + letter, and the built-in font encryption type may be adjusted, but is not limited to the example).
And if so, determining the font encryption type configured in the first font encryption type configuration information as the font encryption type in the webpage content, so that the determination of the font encryption type of the webpage content is realized.
For example, in step S12, after the positioning of the page encryption element is performed on the web page content, it is further determined whether a font encryption type is configured in the preset page encryption configuration information, and when the font encryption type is configured in the preset page encryption configuration information, the font encryption type configured in the first font encryption type configuration information is determined as the font encryption type in the web page content, so that the key data information on the web page is protected more accurately, and it is difficult for the crawler to obtain the data that is to be crawled, thereby achieving the effect of preventing the crawler. And when the preset page encryption configuration information is not configured with the font encryption type, determining the font encryption type configured in the second font encryption type configuration information which is default by the system as the font encryption type in the webpage content, thereby realizing the determination of the font encryption type of the webpage content.
After determining the element positioning position and font encryption type of the page encryption element of the web page content in step S12, in step S13, a target font library is randomly selected from preset font libraries, and the selected target font library (such as style label information, font library file link information, etc.) is added to the current web page content; in the step S14, the font encryption type determined in the step S12 is combined to replace the page content at the element positioning position in the web page content with the content in the target font library, so that the content of the web page that needs to be encrypted is replaced with the content expressed in the target font library selected from the customized preset font library, thereby encrypting the web page content and achieving the purpose of ensuring the security of the web page content requested to be accessed by the user.
Another embodiment of the present application provides a method for encrypting web page content, further including:
the new page content after the web page content replacement is sent to the user equipment corresponding to the user, so that in the process of obtaining the web page content requested to be accessed by the user equipment corresponding to the user, the obtained new web page content is new web page content information obtained after the web page content replacement encryption, namely, a crawler program obtains a string of random messy code data, the real information of the web page content requested to be accessed by the user cannot be stolen, the accurate encryption processing of the web page is realized, the key data information on the web page is protected more accurately, and the effect of preventing the crawler is achieved.
Another embodiment of the present application provides a method for encrypting web page content, further including:
and updating each font library in the preset font libraries in real time or periodically. Here, updating each font library in the preset font library in real time or periodically includes but is not limited to adding, deleting, and modifying data in a certain font library in the preset font library or adding, deleting, and modifying the font library to the whole preset font library, so that the preset font library is updated, the encryption effect of the webpage content is improved, the key data information on the webpage is protected more accurately, and the purpose of preventing crawlers is achieved.
For example, each font library in the preset font library is updated in real time or periodically, and finally synchronized to each cloud platform or CDN system node for use by each cloud platform or CDN system node, so that the preset font library is updated, the encryption effect of the web page content is improved, the key data information on the web page is protected more accurately, and the purpose of preventing crawlers is achieved.
According to another aspect of the present application, there is also provided a computer readable medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the method of controlling user base alignment as described above.
According to another aspect of the present application, there is also provided a web page content encryption apparatus, comprising:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method of controlling user base station on a device as described above.
Here, for details of each embodiment of the device, reference may be specifically made to corresponding parts of the embodiment of the method for controlling user base pairing at the device side, and details are not described here.
In summary, the application obtains the webpage content corresponding to the access request of the user; based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; according to the font encryption type, the page content on the element positioning position in the webpage content is replaced by the content in the target font library, namely, the key data information (namely, the page content) on the element positioning position of the webpage is replaced by the target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, a crawler program is difficult to acquire the data of the webpage to be crawled, the effect of preventing the crawler is achieved, meanwhile, the risk of mistaken killing does not exist for the visitor who normally visits through a browser, the visitor can see all content information presented on the webpage, and the user experience is improved.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (10)

1. A method for encrypting web page content, the method comprising:
acquiring webpage content corresponding to an access request of a user;
based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content;
randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content;
and replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type.
2. The method of claim 1, further comprising:
acquiring a website service requirement of the user from user equipment;
and configuring the preset page encryption configuration information and a first enabling condition for the webpage to be acquired by the user according to the website service requirement.
3. The method of claim 1, wherein obtaining the element-locating position of the web page corresponding to the web page content further comprises:
and positioning the page encryption element on the webpage content to obtain an element positioning position.
4. The method according to claim 2, wherein before the obtaining of the content of the webpage corresponding to the access request of the user, the method further comprises:
starting a content encryption function of the webpage which the user requests to access;
judging whether the webpage which the user requests to access is configured with a first enabling condition for starting the content encryption function or not,
if not, the system defaults that the webpage page which the user requests to access meets a second enabling condition for starting the content encryption function;
and if so, carrying out condition matching on the webpage which the user requests to access and a configured first enabling condition.
5. The method according to claims 1 to 2, wherein the preset page encryption configuration information comprises first page encryption element range configuration information and/or first font encryption type configuration information, wherein the obtaining an element positioning position of a web page corresponding to the web page content and determining a font encryption type in the web page content based on the preset page encryption configuration information comprises:
judging whether the preset page encryption configuration information is configured with a page encryption element range or not,
if not, positioning the page encryption element of the webpage content according to the default second page encryption element range configuration information of the system to obtain an element positioning position,
if so, positioning the page encryption element of the webpage content according to the first page encryption element range configuration information to obtain an element positioning position;
and determining the font encryption type in the webpage content based on the first font encryption type configuration information.
6. The method of claim 5, wherein determining the font encryption type in the webpage content based on the first font encryption type configuration information comprises:
judging whether the preset page encryption configuration information is configured with a font encryption type or not,
if not, determining the font encryption type configured in the second font encryption type configuration information of the default system as the font encryption type in the webpage content;
and if so, determining the font encryption type configured in the first font encryption type configuration information as the font encryption type in the webpage content.
7. The method of any of claims 1-6, wherein the method further comprises:
and sending the new page content after the webpage content is replaced to user equipment corresponding to the user.
8. The method of any of claims 1-6, wherein the method further comprises:
and updating each font library in the preset font libraries in real time or periodically.
9. A computer readable medium having computer readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 8.
10. An apparatus for encryption of web page content, the apparatus comprising:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
CN202010328794.XA 2020-04-23 2020-04-23 Webpage content encryption method and equipment Active CN113553601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010328794.XA CN113553601B (en) 2020-04-23 2020-04-23 Webpage content encryption method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010328794.XA CN113553601B (en) 2020-04-23 2020-04-23 Webpage content encryption method and equipment

Publications (2)

Publication Number Publication Date
CN113553601A true CN113553601A (en) 2021-10-26
CN113553601B CN113553601B (en) 2023-04-18

Family

ID=78101124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010328794.XA Active CN113553601B (en) 2020-04-23 2020-04-23 Webpage content encryption method and equipment

Country Status (1)

Country Link
CN (1) CN113553601B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489839A (en) * 2022-01-12 2022-05-13 海南车智易通信息技术有限公司 Method and device for loading configuration data aiming at page and server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635622A (en) * 2008-07-24 2010-01-27 阿里巴巴集团控股有限公司 Method, system and equipment for encrypting and decrypting web page
CN109684843A (en) * 2018-12-25 2019-04-26 北京知道创宇信息技术有限公司 Data processing method and device
CN109862031A (en) * 2019-03-13 2019-06-07 娄奥林 A kind of methods of pair of anti-crawler of encryption
CN110166465A (en) * 2019-05-27 2019-08-23 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of access request
CN110990799A (en) * 2018-09-28 2020-04-10 北京国双科技有限公司 Data processing method, device and system for anti-crawler and storage medium
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635622A (en) * 2008-07-24 2010-01-27 阿里巴巴集团控股有限公司 Method, system and equipment for encrypting and decrypting web page
CN110990799A (en) * 2018-09-28 2020-04-10 北京国双科技有限公司 Data processing method, device and system for anti-crawler and storage medium
CN109684843A (en) * 2018-12-25 2019-04-26 北京知道创宇信息技术有限公司 Data processing method and device
CN109862031A (en) * 2019-03-13 2019-06-07 娄奥林 A kind of methods of pair of anti-crawler of encryption
CN110166465A (en) * 2019-05-27 2019-08-23 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of access request
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489839A (en) * 2022-01-12 2022-05-13 海南车智易通信息技术有限公司 Method and device for loading configuration data aiming at page and server
CN114489839B (en) * 2022-01-12 2023-08-01 海南车智易通信息技术有限公司 Method and device for loading configuration data on page and server

Also Published As

Publication number Publication date
CN113553601B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
US10491614B2 (en) Illegitimate typosquatting detection with internet protocol information
CN102594934B (en) Method and device for identifying hijacked website
ES2679286T3 (en) Distinguish valid users of robots, OCR and third-party solvers when CAPTCHA is presented
KR102071160B1 (en) Application Information Methods and Devices for Risk Management
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
US20140380477A1 (en) Methods and devices for identifying tampered webpage and inentifying hijacked web address
CN109194671B (en) Abnormal access behavior identification method and server
Bujlow et al. Web tracking: Mechanisms, implications, and defenses
CN110035075A (en) Detection method, device, computer equipment and the storage medium of fishing website
CN106789939A (en) A kind of detection method for phishing site and device
CN107241292B (en) Vulnerability detection method and device
CN105897663A (en) Method for determining access authority, device and equipment
US10614417B2 (en) System and method for electronic lead verification
US10931688B2 (en) Malicious website discovery using web analytics identifiers
Urban et al. Towards understanding privacy implications of adware and potentially unwanted programs
Franken et al. Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
CN113553601B (en) Webpage content encryption method and equipment
CN113285936B (en) Cross-domain data acquisition method and related device
US11582226B2 (en) Malicious website discovery using legitimate third party identifiers
CA2855828C (en) Security systems and methods for encoding and decoding digital content
US9904662B2 (en) Real-time agreement analysis
CN111818038B (en) Network data acquisition and identification method and device
ES2960889T3 (en) Methods to detect tracking elements of a web page and related server devices
CN112637171A (en) Data traffic processing method, device, equipment, system and storage medium
CN112437036B (en) Data analysis method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40062688

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant